Font Size: a A A

The Research And Application Of Network Security Audit System

Posted on:2007-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:L L YanFull Text:PDF
GTID:2178360185464059Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the computer technology in particular network technology is applied to many professions, the problem of network information security day by day receives people's attention .At present, generally used the technology of firewall, anti-virus and so on to promote the system security in the network. But, while these technologies effective prevent exterior the security hidden danger, actually to comes to be helpless from the internal hidden danger. Some research point out, the majority of network security threatens from the system interior, so we are urgent need to use one kind of new measure and the technology safeguard the network security.This paper in view of guard against from the internal network security threat question, designed the network security audit system. It use the function of the switches SPAN, Capture the packet that flow through the switches, the format of protocol , the way of transmission and the format of command, revert the process of operation .At last, compares with the rule that come form manager center. Audit the operation of the people, and respond the audit result. Therefore, this system likes the second security strobe behind firewall, it can effective make up the insufficiency of firewall function, promote network system security.This system has the widespread application and may be operational. In this paper finally, introduces the model application case of this system in some telecommunication operation business.
Keywords/Search Tags:network security audit, capture data package, protocol analysis, security log
PDF Full Text Request
Related items